Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
ISC '01 Proceedings of the 4th International Conference on Information Security
On the limits of steganography
IEEE Journal on Selected Areas in Communications
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Words are not enough: sentence level natural language watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
Nostega: A Novel Noiseless Steganography Paradigm
Journal of Digital Forensic Practice
Content-aware steganography: about lazy prisoners and narrow-minded wardens
IH'06 Proceedings of the 8th international conference on Information hiding
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
Social network-based botnet command-and-control: emerging threats and countermeasures
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Headstega: e-mail-headers-based steganography methodology
International Journal of Electronic Security and Digital Forensics
Sumstega: summarisation-based steganography methodology
International Journal of Information and Computer Security
Deniable encryption with negligible detection probability: an interactive construction
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Edustega: an Education-Centric Steganography methodology
International Journal of Security and Networks
A compression-based text steganography method
Journal of Systems and Software
Jokestega: automatic joke generation-based steganography methodology
International Journal of Security and Networks
Hi-index | 0.00 |
Information hiding has several applications, one of which is to hide the use of cryptography. The Nicetext [5,6] system introduced a method for hiding cryptographic information by converting cryptographic strings (random-looking) into "nice text" (namely innocuous looking). The system retains the ability to recover the original ciphertext from the generated text. Nicetext can hide both plaintext and cryptographic text.The purpose of such transformations are to mask ciphertext from anyone who wants to detect or censor encrypted communication, such as a corporation that may monitor, or censor, its employee private mail. Even if the message is identified as the output of Nicetext, the sender might claim that the input was simply a pseudo-random number source rather than ciphertext.This paper extends the Nicetext protocol to enable deniable cryptography/ messaging using the concepts of plausible deniability [2,7]. Deniability is derived from the fact that even if one is forced to reveal a key to the random string that "nice text" reverts to, the real cryptographic/ plaintext messages may be stored within additional required sources of "randomness" in the extended protocol.